Explore the evolution of commodity programs into advanced threats in this 53-minute conference talk from BSidesLV 2016. Delve into the concept of "Operation Escalation" as Israel Barak breaks down the intricate details of targeted attacks, legal considerations surrounding Remote Desktop Protocol (RDP), and the ethical implications of cybersecurity research. Gain insights into various tools and techniques used by threat actors, including DP Log Cleaner, RDPPea, and server lists. Examine real-world examples involving institutions like the University of Washington and analyze the impact on credit card processing systems. Investigate command and control structures, RDP processes, and key indicators of compromise. Learn about Mac marketplaces, uptime considerations, and endpoint security in this comprehensive exploration of emerging cyber threats.
Operation Escalation - How Commodity Programs Are Evolving Into Advanced Threats